防止最近流行的com/css/c.js注入的解决方法

王朝网站推广·作者佚名  2011-12-04
窄屏简体版  字體: |||超大  

最近流行的病毒SQL代码:Script Src=http://c.nu%63%6Cear3.com/css/c.js>现已找到解决办法。

直接复制下面的代码保存一个ASP文件

#include到数据库连接文件就OK了

至于已经存在的咋数据库直接运行一下代码替换

update ass set title =replace(cast(title as varchar(8000)),’js代码段’,”)

只能一个字段一个字段的进行替换,没有别的办法

<%

'--------定义部份------------------

Dim XH_Post,XH_Get,XH_Cookie,XH_In,XH_Inf,XH_Xh,XH_Inf2,XH_In2

'自定义需要过滤的字串,用 "|" 分隔

XH_In = "'|;|and|exec|insert|select|delete%20from|update|count|*|%|chr|mid|master|truncate|char|declare|drop%20table|from|net%20user|xp_cmdshell|/add|net%20localgroup%20administrators|Asc|char"

XH_In2 = "'|;|and|exec|insert|select|delete%20from|update|count|chr|mid|master|truncate|char|declare|drop%20table|from|net%20user|xp_cmdshell|/add|net%20localgroup%20administrators|Asc|char"

'----------------------------------

%>

<%

XH_Inf = split(XH_In,"|")

XH_Inf2 = split(XH_In2,"|")

'--------POST部份------------------

If Request.Form<>"" Then

For Each XH_Post In Request.Form

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.Form(XH_Post)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓<br>"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"

Response.Write "操作时间:"&Now&"<br>"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"

Response.Write "提交方式:POST<br>"

Response.Write "提交参数:"&XH_Post&"<br>"

Response.Write "提交数据:"&Request.Form(XH_Post)

Response.End

End If

Next

Next

End If

'----------------------------------

'--------GET部份-------------------

If Request.QueryString<>"" Then

For Each XH_Get In Request.QueryString

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.QueryString(XH_Get)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓<br>"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"

Response.Write "操作时间:"&Now&"<br>"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"

Response.Write "提交方式:GET<br>"

Response.Write "提交参数:"&XH_Get&"<br>"

Response.Write "提交数据:"&Request.QueryString(XH_Get)

Response.End

End If

Next

Next

End If

'----------------------------------

'--------COOKIE部份-------------------

If Request.Cookies<>"" Then

For Each XH_Cookie In Request.Cookies

For XH_Xh=0 To Ubound(XH_Inf2)

If Instr(LCase(Request.Cookies(XH_Cookie)),XH_Inf2(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓<br>"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"

Response.Write "操作时间:"&Now&"<br>"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"

Response.Write "提交方式:Cookie<br>"

Response.Write "提交参数:"&XH_Cookie&"<br>"

Response.Write "提交数据:"&Request.Cookies(XH_Cookie)

Response.End

End If

Next

Next

End If

'----------------------------------

%>

如果有必要用cookie做认证的可以用下面试验下,可以保证躲过这次的自动攻击,但手动攻击不保证能防住,有条件的还是把cookie认证改成session认证保险点

如果没有COOKIE认证,可以直接用这个,代码不需要修改

代码如下

<%

'--------定义部份------------------

Dim XH_Post,XH_Get,XH_Cookie,XH_In,XH_Inf,XH_Xh

'自定义需要过滤的字串,用 "|" 分隔

XH_In = "'|;|and|exec|insert|select|delete%20from|update|count|*|%|chr|mid|master|truncate|char|declare|drop%20table|from|net%20user|xp_cmdshell|/add|net%20localgroup%20administrators|Asc|char"

'----------------------------------

%>

<%

XH_Inf = split(XH_In,"|")

'--------POST部份------------------

If Request.Form<>"" Then

For Each XH_Post In Request.Form

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.Form(XH_Post)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓<br>"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"

Response.Write "操作时间:"&Now&"<br>"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"

Response.Write "提交方式:POST<br>"

Response.Write "提交参数:"&XH_Post&"<br>"

Response.Write "提交数据:"&Request.Form(XH_Post)

Response.End

End If

Next

Next

End If

'----------------------------------

'--------GET部份-------------------

If Request.QueryString<>"" Then

For Each XH_Get In Request.QueryString

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.QueryString(XH_Get)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓<br>"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"

Response.Write "操作时间:"&Now&"<br>"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"

Response.Write "提交方式:GET<br>"

Response.Write "提交参数:"&XH_Get&"<br>"

Response.Write "提交数据:"&Request.QueryString(XH_Get)

Response.End

End If

Next

Next

End If

'----------------------------------

'--------COOKIE部份-------------------

If Request.Cookies<>"" Then

For Each XH_Cookie In Request.Cookies

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.Cookies(XH_Cookie)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓<br>"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"

Response.Write "操作时间:"&Now&"<br>"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"

Response.Write "提交方式:Cookie<br>"

Response.Write "提交参数:"&XH_Cookie&"<br>"

Response.Write "提交数据:"&Request.Cookies(XH_Cookie)

Response.End

End If

Next

Next

End If

'----------------------------------

%>

为了自己的网站不再被SQL注入,请大家及时检查和修复漏洞.

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
 
 
© 2005- 王朝網路 版權所有 導航